--%>

What is message authentication

Explain what is meant by the term message authentication? Describe the classes of message authentication function.

E

Expert

Verified

It is defines as a procedure which verifies if the received message comes from the assigned source has not been changed.

Classes of message authentication function are as considered as:

a) Message encryption : The whole cipher text could be used for the purpose of authentication.

b) Message Authentication Code : It is defined as a function of the message and secret key generate a fixed length value.

c) Hash function : This function maps the message of any length to the fixed length that serves as the authentication.

   Related Questions in Computer Network Security

  • Q : Key algorithms in S/MIME Specify the

    Specify the key algorithms which are used in the S/MIME?

  • Q : AES and Rijndael State difference

    State difference between the AES and Rijndael?

  • Q : End-to-end encryption and link State

    State the difference between end-to-end encryption and link?

  • Q : Advances of LAN Security Setup Advances

    Advances of LAN Security Setup: The company should use firewall in order to separate the wireless Local Area Network. A gateway/ firewall is used in order to separate the wireless and wired networks. This helps to screen the traffic in wired network.

  • Q : Requirements for process of message

    State requirements for the process of message authentication.

  • Q : What is S/MIME What is meant by the

    What is meant by the term S/MIME?

  • Q : Security and Recovery in networking

    Security and Recovery: While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. Subsequent to the last security audit, it is essen

  • Q : LAN Security Systems LAN Security

    LAN Security Systems: The threats might be of very serious concern to the organization and hence they should be addressed with the deployment of a security system which can prevent the attacker to access the information which is sensitive to the organ

  • Q : Ip Question 4 - You have been asked to

    Question 4 - You have been asked to design an IP addressing plan for a medium size corporation, Corporation (X) converting to an IP network. The corporation currently has 88 locations but plans to expand to approximately 100 Locations within the next year. Each location should have a user network

  • Q : Secure a network perimeter How can you

    How can you secure a network perimeter? Be ensure to discuss all three of the basic access points into most networks, as well as the different types of firewalls commonly used today.